[CLSA-2022:1643819084] Fix CVE(s): CVE-2022-23218, CVE-2022-23219
Type:
security
Severity:
moderate
Release date:
2022-02-02 16:24:44 UTC
Description:
* SECURITY UPDATE: buffer overflow in svcunix_create - debian/patches/any/CVE-2022-23218.patch: check whether AF_UNIX socket path length doesn't exceed storage size - CVE-2022-23218 * SECURITY UPDATE: buffer overflow in clnt_create - debian/patches/any/CVE-2022-23219.patch: check whether AF_UNIX socket path length doesn't exceed storage size - CVE-2022-23219
Updated packages:
  • glibc-doc_2.23-0ubuntu11.5+tuxcare.els3_all.deb
    sha:1aecc8fa24d28bbb23f78893f0db60d090a33a11
  • glibc-source_2.23-0ubuntu11.5+tuxcare.els3_all.deb
    sha:6bcfdb188a4ca56a821192b22d2cad2c9fc4122f
  • libc-bin_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:917ff54d949ba7c08f667604cea6010d378515ec
  • libc-dev-bin_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:9947681f264287bdea1ed0e3cb60c60baec151e9
  • libc6_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:3cdd15dba9225a538443673a1d08c5f04a80c03f
  • libc6-dev_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:3bc7148a3733fe6252a5393f8589147e6b983d90
  • libc6-dev-i386_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:0340ca9ea92253231033964279ef135caa093e66
  • libc6-dev-x32_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:44efec8b06d39cad5c4db4cfa865256995a0f94c
  • libc6-i386_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:cd3b81e56eaef3c3404280f25cc0ac79c48f3204
  • libc6-pic_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:cb15fa307f09eed39bc81441bbde5c35e43f1c8a
  • libc6-x32_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:1df906d99bf09d451d83a6e2c65edb294eb75b49
  • locales_2.23-0ubuntu11.5+tuxcare.els3_all.deb
    sha:6c9efb117818043dedf166e15cd4e994981ffd4e
  • locales-all_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:8536552ebb8b038317dd26dc058be23d93bbc5db
  • multiarch-support_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:e2526e1950908f6515c2d591451b777e4dc424af
  • nscd_2.23-0ubuntu11.5+tuxcare.els3_amd64.deb
    sha:5f01631d6b0b952ceb8a73baeffd1794926183f4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.